Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0"

Transcription

1 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers complete protection against viruses, spyware, hackers, spam, and other online threats. Multi-layered identity protection encrypts your passwords and private information so you can shop and bank safely. Installing the software Follow these instructions to install or upgrade the Webroot software from a CD or from a downloaded file. 1. Before you begin, make sure you are connected to the Internet and close all programs that may be open on your computer. If you have an antivirus program or a firewall program from another vendor installed, you must uninstall the old program or disable its function. 2. Start the installation either from a CD or from a file downloaded from our Web site. If you purchased the Webroot software on a CD, insert the CD into a drive and follow the on-screen instructions to begin. If you downloaded the file, double-click on WRInstall.exe to begin. The Webroot Installer dialog opens. Note about upgrading: If you are upgrading from a previous version of the Webroot software (versions 6.1 and below), the installation routine detects your older version and will uninstall it before installing the 7.0 program files. Also please note that some of your program settings and your quarantine information from these older versions will not transfer to the new 7.0 version. If you have questions, contact Webroot Support. 3. Enter your keycode, then click Agree & Install. (Your keycode is listed in an message from Webroot or is listed on the CD sleeve.) The Webroot software copies files to the following folder: C:\Program Files\Webroot\Security\ Webroot Software, Inc. All rights reserved. Webroot Software, Webroot, Spy Sweeper, the Webroot icon and the Spy Sweeper icon are registered trademarks of Webroot Software, Inc. All other trademarks are the properties of their respective owners.

2 4. Click Restart Now at the Installation Successful dialog. After a restart, the Webroot Firewall determines if your computer is connected to a network. If it does, the dialog shown below opens and displays the network (IP) address. In most cases, the firewall is detecting your home network (the network address will most likely begin with the numbers xx.x). If your home network address is displayed, click Add as Trusted. If the Webroot software detects additional network connections, it opens a dialog for each one. For example, if you are connecting to a neighborhood wireless network, it opens another dialog and displays the IP address of that network. For any outside networks, you may want to click Add as Untrusted just to be safe. (If you aren t sure whether your answer to this dialog is correct, don t worry about it for now. Later, you can modify the local network list in the Firewall settings, which is available by clicking Edit settings under PC security, Firewall tab, Security Location, Edit Local Networks.) 5. To ensure that the software is running, look for the Webroot icon in the system tray (located in the lower right corner of your computer screen). The status indicator is yellow until you run a scan: Running the first scan After installation, a Welcome panel opens and prompts you to run a scan to search for any existing threats on your computer. We recommend that you run the scan immediately. The scan may take awhile, but it runs in the background so you can work on your computer as it searches for threats. 1. When the Welcome panel appears, click OK, thanks. Keep the checkbox selected. Click. Quick Start 2

3 As it scans, the PC Security panel shows its progress. 2. At any time, you can click View details to see what it found. Click to see scan details in progress. When the scan completes, the Webroot software briefly opens an alert above the system tray. 3. From the alert, you can click the View Details link to view the scan details. (If the alert closes before you have a chance to click the link, point your mouse to the PC Security panel, click the Edit settings button, then click View scan details in the Scan tab.) The Scan Complete panel shows what the System Scanner found, its risk level (multiple bars indicate a higher risk), its status, and a link to more details. The status can be any of the following states: Quarantined. The item was moved to Quarantine, where it was rendered inoperable and cannot harm your computer. Suspect. The item is classified as a potentially unwanted application and was not moved to Quarantine. You must take action yourself by selecting the item in the panel and choosing either the Quarantine selected items or Ignore selected items button. Removed. The item was deleted before the System Scanner quarantined it. This might happen if you are running another security program that removed it or if you manually deleted the file yourself during the scan. Any removed items are no longer a threat to your computer. Cleaned. The item was managed by a virus-cleaning process that removed infected portions of the file and restored the cleaned file to your computer in its original location. A copy of the corrupted file is now in Quarantine. The cleaned file is safe to use; the file in Quarantine is not safe to use. Quick Start 3

4 4. If you don t recognize an item and want to know more about it, click View details to the right for a pop-up description. You can also click the plus sign to the left of the item to view the directory where it was found. Note about cookies: The System Scanner may quarantine a large number of cookies. Cookies are small bits of text generated by a Web server and then stored on your computer for future use. They cannot steal information off your machine, but some do store personal information that you may not want outside parties to gather. The System Scanner only searches for third-party cookies associated with advertising sites that may be gathering information about your surfing habits. 5. Click the Finish button when you are done viewing details. From now on, you do not need to launch a scan yourself or schedule scans. The Webroot software automatically scans your computer at optimal times. However, if you do want to run a scan immediately, right-click on the Webroot icon from the system tray, then select Scan Now from the menu. Quick Start 4

5 Creating a Webroot account and configuring components After you run the first scan, the Home panel opens and looks similar to the following example. You will notice that the Sync & Sharing and Identity & Privacy panels show yellow icons and Set up now buttons. You need to create a Webroot account before you can use the Sync & Sharing Manager or the Password Manager (under Identity & Privacy). 1. From the Home panel, click on My Account from the taskbar at the bottom. (You can also click one of the Set up now buttons.) The My Account panel opens and shows your keycode, version number, and other information about your subscription. 2. Click the Manage My Account button at the bottom of the panel. Quick Start 5

6 The My Account Creation dialog opens. 3. Click the Create account button and follow the on-screen instructions. Note about creating user names: The Webroot software blocks certain terms in user names, such as obscene words. If you use a term on our blocked list, your account creation may be rejected. If you experience problems creating an account, contact Webroot Support. After you create an account, you will notice that the Sync & Sharing panel still shows a yellow icon and a Set up now button. You must now designate folders on your computer that will automatically be synchronized with Webroot s online repository, as described in the next steps. 4. From the Home panel, point your mouse to the Sync & Sharing panel, then click Set up now. A dialog opens and prompts you to sign in to your Webroot account. 5. Enter your user name and password, then click the Sign In button. A Setup dialog opens that will guide you through the process of creating synchronization folders. Any files in these folders are automatically copied to Webroot s online repository (a collection of secure servers where your data is safely encrypted and stored). Be aware that if you make a change in your synchronization folders (edit a file, add a file, or delete a file), the Sync and Sharing Manager immediately makes the same change to your account in the online repository. Depending on the number and size of the selected folders, the upload may take several minutes. When it s done, the Sync & Sharing panel changes to green. Quick Start 6

7 Accessing your online account Your Webroot account includes your software license status and provides access to certain tasks, such as upgrading your software, accessing Sync and Sharing functions, and accessing Password Manager functions. The account is available online through My Webroot, which is your personalized Web site available 24 hours a day, every day of the year, from any computer with an Internet connection. 1. Open a Web browser and enter https://www.webroot.com/mywebroot. (You can also select Launch My Account from the System Tray menu; to display the menu, right-click on the tray icon.) My Webroot opens with a Sign In panel on the right: 2. Enter your user name ( address) and password, then click Sign in. Your personalized My Webroot account opens in the browser. Also notice a new Webroot toolbar installed at the top of your browser. This toolbar allows you to easily access Webroot sites, access Password Management features, and sign in and out of your account. Note about the toolbar: Do not disable or uninstall the Webroot toolbar. This may result in unexpected behavior and will disable access to some Webroot software functionality. Toolbar Click to access pages Quick Start 7

8 The following table describes the pages available in My Webroot. Home MyAccount MyData MyIdentity Serves as the main dashboard to all My Webroot functions available with your subscription and license. Shows your account details and software license information. Click the following tabs: Contact Information. Enter or change your personal contact information so Webroot can contact you for product update announcements. Licenses & Products. View license information and status for any Webroot products you purchased. The license information includes the product name, the keycode, where the software is installed (which computer), and when your subscription expires. You can also use this page to re-install your licensed software, install it onto another computer, or renew your subscription. Support. Create a support ticket to send to Webroot or view any past tickets you opened. Allows you to manage files and photos in the Sync and Sharing Manager. Click the following tabs: My Folders and Files. Manage the files and folders uploaded during synchronization. Recent Events. View the ten most recent activities performed with the Sync and Sharing Manager. Photos. Manage the photo albums uploaded and created with the Sync and Sharing Manager. Allows you to manage and access all your sites protected with the Password Manager. Click the following tabs: Sites. View and manage all the sites you defined with the Password Manager. Favorites. View and access sites you designated as your favorites. Form Fill profiles. View and manage personal data for auto-filling into Web forms. Passwords. View and manage all passwords defined with the Password Manager. Quick Start 8

9 Checking status and changing settings The Webroot software works in the background without disrupting your normal activities. If you log out of your computer or turn it off, the Webroot software launches again automatically when you restart Windows. If desired, you can check system status or change settings by opening the Home panel (double-click the Webroot icon in the system tray): Click to close Click for a status summary Panels Taskbar The main interface displays in either green (status is secure), yellow (a status item requires your attention), or red (a critical item requires your attention). If the system state is yellow or red, details about the issue appear on the screen with instructions for fixing the issue. You can click the See how button to learn more. To change system settings, see the following table. PC Security panel Sync and Sharing Manager panel When you point your mouse to PC Security, the Edit settings button appears. Click this button to change settings for the following components: System Scanner. Run an immediate scan or select the Use custom scan settings and click Edit to change what items the scanner detects. Shields. The Shields are preconfigured to monitor activity on your computer while you surf the Internet, connect to a network, and open attachments; however, you can change shield settings if you want. Firewall. The firewall is preconfigured to begin monitoring and filtering data traffic traveling in and out of the computer ports; however, you can change some firewall filtering and settings if you want. Quarantine. After the System Scanner and Shields have quarantined threats that match our security definitions, you can view the items in Quarantine. If necessary, you can remove or restore items. The Sync and Sharing Manager automatically uploads files from designated folders on your computer to Webroot s online repository, which is a collection of secure servers. The content in your folders and your online account are always identical. Click Manage files to configure additional folders, synchronize multiple computers, and share photos with friends. Quick Start 9

10 System Cleaner panel Identity & Privacy panel The System Cleaner removes all traces of your Web browsing history, files that show your computer use, and other files that reveal your activity. You must run a cleanup manually or schedule cleanups. To begin a manual cleanup, click Clean system from the Home panel. To configure cleanup settings, point your mouse to the System Cleaner panel and click Edit settings. Click the Manage now button to configure settings for the following components: Password Management. The Password Manager is preconfigured to begin protecting your identity immediately. To use the Password Manager, open either Internet Explorer or Firefox. The Webroot toolbar is displayed in the banner area of your browser. Click the Sign In button and enter the user name and password for your Webroot account. Taskbar Access a Web page that requires you to log in to an account, such as your online banking site. When you log in, the Password Manager prompts you to save the site information. The next time you access this Web site, the Password Manager remembers the information for you. Anti-Spam. The Anti-Spam Manager is preconfigured to use with Outlook Express or Outlook (versions 2003, 2007, or bit). In these clients, it filters all your messages for spam (unwanted junk mail) or phishing attempts (fraudulent tricks to steal your information). Anti-Phishing. The Anti-Phishing Manager is preconfigured to alert you to any Web sites that are associated with phishing scams. The Anti-Phishing Manager works with the following browsers: Internet Explorer (versions 6.0 and above) or Firefox (versions 3.5 and above). It also works with the following search engines: Google, Yahoo, Bing, Lycos, and Ask. Secure Browsing. The Secure Browsing Manager is preconfigured to block malicious Web sites from loading before you access them. It also alerts you to unsafe Web sites when you use a search engine. The Secure Browsing Manager works with the following browsers: Internet Explorer (versions 6.0 and above) or Firefox (versions 3.5 and above). It also works with the following search engines: Google, Yahoo, Bing, Lycos, and Ask. Click the buttons in the taskbar to access the following tasks: Help. Click to learn more about using the Webroot software. My Account. Click to see your subscription information. Settings. Click to modify scanning schedules, view the system history, set program update options, set Gamer mode, and specify settings for a proxy server. Support. Click for technical support options. Notifications. Click to view recent status messages and alerts. You can close the main interface by selecting the close button ( ) in the upper right of the title bar. (Closing the main interface does not shut down the software; it still runs in the background to protect your computer.) Quick Start 10

11 Responding to pop-up alerts When you surf the Internet and work on your computer, watch for Webroot pop-up alerts and respond to them when necessary. Pop-up alerts in the middle of your screen: The Webroot software automatically manages most threats for you. If it locates a threat trying to launch on your computer, it disables it and moves it to Quarantine. However, if the software detects an item that it classifies as a potential threat or it does not recognize, it opens a pop-up alert and asks whether you want to accept the item or prevent it from installing on your computer. If you are purposely downloading an item, such as a new toolbar, click Allow. Otherwise, click Block. You can click Show Details to read more information about the item attempting to launch. Pop-up alerts in the system tray: If your computer is secure, the Webroot icon appears in the system tray with a green status indicator: If the software needs to inform you about a system status, it opens an alert above the Webroot icon. For important items that require your attention, it changes the color of the status indicator from green to yellow. For critical items that require your intervention, it changes the color to red. Click View Notifications in the alert balloon to find out more about the alert. Accessing additional instructions and support To access video tutorials, user guides, and Webroot support options, visit the Webroot Support site at: support.webroot.com Quick Start 11

User Guide for Mac OS X

User Guide for Mac OS X User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0. User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

User Guide for the Identity Shield

User Guide for the Identity Shield User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Frequently Asked Questions: Xplornet Internet Security Suite

Frequently Asked Questions: Xplornet Internet Security Suite Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Total Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Cesview IIi 1.3 Installation and Automation Guide

Cesview IIi 1.3 Installation and Automation Guide Cesview IIi 1.3 Installation and Automation Guide Contents: New ser Quick Guide Cesview IIi asic Installation o Additional Server Installation Notes o Additional rowser Only (Client) Installation Notes

More information

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Internet Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets

More information

Keeping Windows 8.1 safe and secure

Keeping Windows 8.1 safe and secure Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Using Symantec AntiVirus. Corporate Edition Version 9.0. Software On a DX8000 DVR

Using Symantec AntiVirus. Corporate Edition Version 9.0. Software On a DX8000 DVR Using Symantec AntiVirus Corporate Edition Version 9.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1613M-A (12/04) Contents Using Symantec AntiVirus Corporate Edition 9.0 Software.....................................................................5

More information

AVG AntiVirus Free Edition

AVG AntiVirus Free Edition AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Windows Servers. Administrator's Guide F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

PureMessage for Microsoft Exchange startup guide

PureMessage for Microsoft Exchange startup guide PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: May 2010 Contents 1 About this guide...3 2 Planning your PureMessage deployment...4 3 Installing PureMessage...6 4 Starting

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing NOD32 Typical Installation Guide Version 2.7 Includes Windows Vista and 64-bit protection Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing Best Detection Fastest

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Driver Updater Manual

Driver Updater Manual Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright (ñ) 2007 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

CODESOFT Installation Scenarios

CODESOFT Installation Scenarios CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

Online Backup by Mozy. Restore Common Questions

Online Backup by Mozy. Restore Common Questions Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

Regain Your Privacy on the Internet

Regain Your Privacy on the Internet Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you

More information

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Installation Guidelines (English) First steps

Installation Guidelines (English) First steps First steps Installation Guidelines (English) We are delighted that you have decided to start using our product and hope that you are completely satisfied with your new G DATA software. If something does

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

STEP 1: INSTALLING WINDOWS DEFENDER

STEP 1: INSTALLING WINDOWS DEFENDER Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since

More information

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p 1 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com User Guide Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Passwords User Guide. for Webroot SecureAnywhere Complete

Passwords User Guide. for Webroot SecureAnywhere Complete Passwords User Guide for Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere Passwords User

More information

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release) Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active

More information

Printed Documentation

Printed Documentation Printed Documentation Table of Contents K7AntiVirus Premium...1 K7AntiVirus Premium Help... 1 Feature Summary... 2 Online Help Conventions... 3 Managing the Alerts... 9 Configuring Alerts... 9 Backing

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

PureMessage for Microsoft Exchange startup guide. Product version: 3.1

PureMessage for Microsoft Exchange startup guide. Product version: 3.1 PureMessage for Microsoft Exchange startup guide Product version: 3.1 Document date: June 2015 Contents 1 About this guide...4 2 Planning your PureMessage deployment...5 2.1 Deploying PureMessage to Exchange

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Infor Xtreme Browser References

Infor Xtreme Browser References Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

F-Secure Anti-Virus for Mac 2015

F-Secure Anti-Virus for Mac 2015 F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection

More information

Table of Contents. Troubleshooting Guide for Home Users

Table of Contents. Troubleshooting Guide for Home Users Table of Contents Introduction... 1 Chapter 1: System Requirements... 2 Recommended and Minimum Supported Requirements*... 2 Additional Information... 3 Internet Connectivity... 3 Tablet Compatibility...

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

Zimbra Connector for Microsoft Outlook User Guide 7.1

Zimbra Connector for Microsoft Outlook User Guide 7.1 Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information